Authentication method using icon password

a technology of icon password and authentication method, applied in the field of authentication method using icon password, can solve the problem of inevitably leakage of password, and achieve the effect of preventing fundamentally leakage of password and improving security

Active Publication Date: 2012-12-18
RSUPPORT
View PDF16 Cites 73 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0009]Accordingly, the present invention has been made in view of the above problems, and it is an object of the present invention to provide a method of authenticating a user of a terminal using an icon password, in which security is improved in processing a password in an information processing device or a communication network. Leakage of the password is fundamentally prevented in the process of inputting the password by a user, thereby securing reliability on the overall authentication process.
[0012]According to the present invention, security is improved in processing a password in an information processing device or a communication network.
[0013]Furthermore, leakage of the password is fundamentally prevented in the process of inputting the password by a user. Therefore, an effect of securing reliability on the overall authentication process may be obtained.

Problems solved by technology

However, the authentication method described above commonly uses a password based on numerals or characters, and has two problems in that the process of inputting a password is exposed to third parties in the neighborhood, and the password is inevitably leaked by a hacking program when the screen is transmitted.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method using icon password
  • Authentication method using icon password
  • Authentication method using icon password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026]The detailed configuration of the invention will be hereafter described with reference to the accompanying drawings.

[0027]First, FIG. 1 shows constitutional components for performing the present invention, comprising a server 10 and terminals 20 connected through an electronic communication network, in addition to an icon database 11 and an authentication database 12 connected to the server 10.

[0028]Here, as shown in FIG. 1, the communication network may include a public switched telephone network (PSTN), a public switched data network (PSDN), a value added network (VAN), a local area network (LAN), a wide area network (WAN), the Internet, a mobile communication network, and the like. The communication networks listed above may not be an individual concept that can be physically and clearly distinguished. Since the present invention relates to a technique of authenticating a user, not to the configuration of the electronic communication network itself, or a technique of distri...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method of authenticating a user of a terminal operating a server and connected to the terminal through a communication network, in which a password needed for authentication is inputted as icons, rather than numerals or characters, thereby preventing leakage or theft of the password. Through the present invention, security is improved in processing a password in an information processing device or a communication network, and furthermore, leakage of the password is fundamentally prevented in the process of inputting the password by a user. Therefore, an effect of securing reliability of the overall authentication process may be obtained.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention relates to a method of authenticating a user of a terminal operating a server and connected to the server through a communication network, in which a password needed for authentication is inputted as icons, rather than numerals or characters, thereby preventing leakage or theft of the password.[0003]2. Background of the Related Art[0004]Along with the advancements of electronic communication networks such as the Internet and mobile communications, electronic transactions are performed in a variety of areas including commercial businesses, banking, administrative affairs, communications and the like. Accordingly, a variety of authentication techniques have been developed and used for security of transactions.[0005]In authentication techniques for electronic transactions performed through the electronic communication networks, a password may be regarded as the most common and essential element. The p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L29/06G06F21/31G06F21/36
CPCG06F21/36G06F17/00G06F21/00
Inventor SEO, HYUNG SU
Owner RSUPPORT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products